General

  • Target

    2676-36-0x00000000007F0000-0x0000000000838000-memory.dmp

  • Size

    288KB

  • MD5

    587ffc4ca63e29552e16106b6ccd4f54

  • SHA1

    bd3f7290573dbdce6d9d4c6535405918903eaba5

  • SHA256

    882898f79bd6a559f84db59c3cb9d7c81dd36e9134362510583a707cee1a0043

  • SHA512

    c0422156db46420fa4da9c5e1af28943b3a4595d9e704e4d0defa475cfc9c117c0121caab94be2eb71b783a01a3631ecb84583b8118ab4970fd9698f5ce4802e

  • SSDEEP

    6144:5K0jMsk4ciMA4W+hlEyUaq+YaeQB99PvPdHDYvCPb8Nb:5K0jMsk4ciMA4W+hlEyUaq+YaeQB99Pe

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7777204705:AAGdGJgXaEaWvE6yXv7RvWYjJkTQCsiDnJc/sendMessage?chat_id=7698865320

Signatures

  • Vipkeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2676-36-0x00000000007F0000-0x0000000000838000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections